Abstract
For the procedures of creating situational awareness an important element is the freshness (timeliness) of data and the credibility of information sources. A modern and rich source of such data may be sensor networks, but their use as a reliable source of data is a major challenge mainly because the sensor nodes in the network are usually mobile, use wireless links, have a small computing power and have small energy resources. The paper presents a new concept of a secure sensor nodes domain, which is a very reliable source of sensor data. The data transferred inside the domain are protected by cryptography, cryptographic material stored in the resources of sensor nodes is also protected by cryptography, and data obtained from sensor nodes from the place of their acquisition to the sink node are protected. Trusted Platform Module (TPM) is used to support the process of securing the data in the domain. In the second part of the paper developed a secured domain demonstrator for sensor nodes is described, which illustrates the functioning of the key elements of the concept presented.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Sensor node - the element of sensor network, which includes at least the measuring element (sensor), microcontroller and communication module that allows transfer of measured data through wireless connections.
Sensor - measuring component of the sensor node.
- 2.
This implementation of a secure domain demonstrator uses the TPM 1.2, which offers support for RSA 2048, but there is nothing to prevent the use of the TPM 2.0, which allows the use of ECC cryptography.
- 3.
Used module meets the requirements described in Security Policy for Atmel TPM 9, as well as the strength requirements of FIPS 140-2, Level 2 7.
References
Al-Haija, Q.A., Tarayrah, M.A., Al-Qadeeb, H., Al-Lwaimi, A.: Tiny RSA cryptosystem based on arduino microcontroller useful for small scale networks. Procedia Comput. Sci. 34, 639â646 (2014). https://doi.org/10.1016/j.procs.2014.07.091
Furtak, J., ZieliĆski, Z., Chudzikiewicz, J.: Secure protocol for wireless communication within military IoT. In: 2015 IEEE 2nd World Forum on Internet of Things, WF-IoT 2015, pp. 508â513 (2015)
Furtak, J., ZieliĆski, Z., Chudzikiewicz, J.: Security techniques for the WSN link layer within military IoT. In: 2016 IEEE 3rd World Forum on Internet of Things, WF-IoT 2016, pp. 233â238 (2016)
IDQ, Quantis AIS31 Brochure https://marketing.idquantique.com/acton/attachment/11868/f-0220/1/-/-/-/-/Quantis%20AIS31_Brochure.pdf
Jonsen, F.T., et al.: Application of IoT in Military Operations in a Smart City presented at the IEEE International Conference on 2018 Military Communications and Information Systems (2018)
Koteshwara, S., Das, A.: Comparative study of authenticated encryption targeting lightweight IoT applications. IEEE Des. Tests 34(4), 26â33 (2017). https://doi.org/10.1109/mdat.2017.2682234
Requirements For Cryptographic Modules. Federal Information Processing Standard (FIPS 140-2), National Institute of Standards and Technology, 03 December 2002
Puschmann, D., Barnaghi, P., Tafazolli, R.: Adaptive clustering for dynamic IoT data streams. IEEE Internet of Things J. 4(1), 64â74 (2017)
Trusted Computing Group. TPM Main Part 1 Design Principles. Specification Version 1.2. Revision 116, Trusted Computing Group, Incorporated (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this paper
Cite this paper
Furtak, J., ZieliĆski, Z., Chudzikiewicz, J. (2018). Secured Domain of Sensor Nodes - A New Concept. In: HodoĆ, M., Eichler, G., Erfurth, C., Fahrnberger, G. (eds) Innovations for Community Services. I4CS 2018. Communications in Computer and Information Science, vol 863. Springer, Cham. https://doi.org/10.1007/978-3-319-93408-2_15
Download citation
DOI: https://doi.org/10.1007/978-3-319-93408-2_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-93407-5
Online ISBN: 978-3-319-93408-2
eBook Packages: Computer ScienceComputer Science (R0)